summaryrefslogtreecommitdiffstats
path: root/modules/task/migrate.go
diff options
context:
space:
mode:
Diffstat (limited to 'modules/task/migrate.go')
-rw-r--r--modules/task/migrate.go120
1 files changed, 120 insertions, 0 deletions
diff --git a/modules/task/migrate.go b/modules/task/migrate.go
new file mode 100644
index 0000000000..5d15a506d7
--- /dev/null
+++ b/modules/task/migrate.go
@@ -0,0 +1,120 @@
+// Copyright 2019 Gitea. All rights reserved.
+// Use of this source code is governed by a MIT-style
+// license that can be found in the LICENSE file.
+
+package task
+
+import (
+ "bytes"
+ "errors"
+ "fmt"
+ "strings"
+
+ "code.gitea.io/gitea/models"
+ "code.gitea.io/gitea/modules/log"
+ "code.gitea.io/gitea/modules/migrations"
+ "code.gitea.io/gitea/modules/notification"
+ "code.gitea.io/gitea/modules/structs"
+ "code.gitea.io/gitea/modules/timeutil"
+ "code.gitea.io/gitea/modules/util"
+)
+
+func handleCreateError(owner *models.User, err error, name string) error {
+ switch {
+ case models.IsErrReachLimitOfRepo(err):
+ return fmt.Errorf("You have already reached your limit of %d repositories", owner.MaxCreationLimit())
+ case models.IsErrRepoAlreadyExist(err):
+ return errors.New("The repository name is already used")
+ case models.IsErrNameReserved(err):
+ return fmt.Errorf("The repository name '%s' is reserved", err.(models.ErrNameReserved).Name)
+ case models.IsErrNamePatternNotAllowed(err):
+ return fmt.Errorf("The pattern '%s' is not allowed in a repository name", err.(models.ErrNamePatternNotAllowed).Pattern)
+ default:
+ return err
+ }
+}
+
+func runMigrateTask(t *models.Task) (err error) {
+ defer func() {
+ if e := recover(); e != nil {
+ var buf bytes.Buffer
+ fmt.Fprintf(&buf, "Handler crashed with error: %v", log.Stack(2))
+
+ err = errors.New(buf.String())
+ }
+
+ if err == nil {
+ err = models.FinishMigrateTask(t)
+ if err == nil {
+ notification.NotifyMigrateRepository(t.Doer, t.Owner, t.Repo)
+ return
+ }
+
+ log.Error("FinishMigrateTask failed: %s", err.Error())
+ }
+
+ t.EndTime = timeutil.TimeStampNow()
+ t.Status = structs.TaskStatusFailed
+ t.Errors = err.Error()
+ if err := t.UpdateCols("status", "errors", "end_time"); err != nil {
+ log.Error("Task UpdateCols failed: %s", err.Error())
+ }
+
+ if t.Repo != nil {
+ if errDelete := models.DeleteRepository(t.Doer, t.OwnerID, t.Repo.ID); errDelete != nil {
+ log.Error("DeleteRepository: %v", errDelete)
+ }
+ }
+ }()
+
+ if err := t.LoadRepo(); err != nil {
+ return err
+ }
+
+ // if repository is ready, then just finsih the task
+ if t.Repo.Status == models.RepositoryReady {
+ return nil
+ }
+
+ if err := t.LoadDoer(); err != nil {
+ return err
+ }
+ if err := t.LoadOwner(); err != nil {
+ return err
+ }
+ t.StartTime = timeutil.TimeStampNow()
+ t.Status = structs.TaskStatusRunning
+ if err := t.UpdateCols("start_time", "status"); err != nil {
+ return err
+ }
+
+ var opts *structs.MigrateRepoOption
+ opts, err = t.MigrateConfig()
+ if err != nil {
+ return err
+ }
+
+ opts.MigrateToRepoID = t.RepoID
+ repo, err := migrations.MigrateRepository(t.Doer, t.Owner.Name, *opts)
+ if err == nil {
+ notification.NotifyMigrateRepository(t.Doer, t.Owner, repo)
+
+ log.Trace("Repository migrated [%d]: %s/%s", repo.ID, t.Owner.Name, repo.Name)
+ return nil
+ }
+
+ if models.IsErrRepoAlreadyExist(err) {
+ return errors.New("The repository name is already used")
+ }
+
+ // remoteAddr may contain credentials, so we sanitize it
+ err = util.URLSanitizedError(err, opts.CloneAddr)
+ if strings.Contains(err.Error(), "Authentication failed") ||
+ strings.Contains(err.Error(), "could not read Username") {
+ return fmt.Errorf("Authentication failed: %v", err.Error())
+ } else if strings.Contains(err.Error(), "fatal:") {
+ return fmt.Errorf("Migration failed: %v", err.Error())
+ }
+
+ return handleCreateError(t.Owner, err, "MigratePost")
+}